Hello,

We are using ksh 93 release 2010-06-21 compiled on RHEL5.0.

palltc01:/proc/24249: echo ${.sh.version}
Version JM 93t+ 2010-06-21

>From time to time we are getting hung ksh processes that consume cpu wildly

palltc01:/proc/24249: ps -f 24249
UID        PID  PPID  C STIME TTY      STAT   TIME CMD
sml      24249     1 98 Mar09 ?        R    655:56 /bin/ksh -i

Hung processes always have the following strace loop

kill(4294943047, SIGHUP)                = 0
rt_sigreturn(0xffffa147)                = 0
--- SIGHUP (Hangup) @ 0 (0) ---
rt_sigaction(SIGHUP, {0x415100, [], SA_RESTORER|SA_INTERRUPT, 0x360792e300}, 
{0x415100, [], SA_RESTORER|SA_INTERRUPT, 0x360792e300}, 8) = 0
kill(4294943047, SIGHUP)                = 0
rt_sigreturn(0xffffa147)                = 0
--- SIGHUP (Hangup) @ 0 (0) ---
rt_sigaction(SIGHUP, {0x415100, [], SA_RESTORER|SA_INTERRUPT, 0x360792e300}, 
{0x415100, [], SA_RESTORER|SA_INTERRUPT, 0x360792e300}, 8) = 0
kill(4294943047, SIGHUP)                = 0
rt_sigreturn(0xffffa147)                = 0
--- SIGHUP (Hangup) @ 0 (0) ---
rt_sigaction(SIGHUP, {0x415100, [], SA_RESTORER|SA_INTERRUPT, 0x360792e300}, 
{0x415100, [], SA_RESTORER|SA_INTERRUPT, 0x360792e300}, 8) = 0
kill(4294943047, SIGHUP)                = 0
rt_sigreturn(0xffffa147)                = 0
--- SIGHUP (Hangup) @ 0 (0) ---

Here is the ksh call stack

palltc01:/proc/24249: gdb /bin/ksh 24249
GNU gdb Red Hat Linux (6.3.0.0-1.162.el4rh)
Copyright 2004 Free Software Foundation, Inc.
GDB is free software, covered by the GNU General Public License, and you are
welcome to change it and/or distribute copies of it under certain conditions.
Type "show copying" to see the conditions.
There is absolutely no warranty for GDB.  Type "show warranty" for details.
This GDB was configured as "x86_64-redhat-linux-gnu"...
(no debugging symbols found)
Using host libthread_db library "/lib64/tls/libthread_db.so.1".

Attaching to program: /bin/ksh, process 24249
Reading symbols from /lib64/libdl.so.2...(no debugging symbols found)...done.
Loaded symbols for /lib64/libdl.so.2
Reading symbols from /lib64/tls/libm.so.6...(no debugging symbols found)...done.
Loaded symbols for /lib64/tls/libm.so.6
Reading symbols from /lib64/tls/libc.so.6...
(no debugging symbols found)...done.
Loaded symbols for /lib64/tls/libc.so.6
Reading symbols from /lib64/ld-linux-x86-64.so.2...(no debugging symbols 
found)...done.
Loaded symbols for /lib64/ld-linux-x86-64.so.2

0x000000360792e879 in kill () from /lib64/tls/libc.so.6
(gdb) where
#0  0x000000360792e879 in kill () from /lib64/tls/libc.so.6
#1  0x000000000041544a in sh_fault ()
#2  <signal handler called>
#3  0x000000360792e879 in kill () from /lib64/tls/libc.so.6
#4  0x000000000041544a in sh_fault ()
#5  0x000000000044b7eb in sh_funscope ()
#6  0x000000000044b9da in sh_funct ()
#7  0x0000000000447904 in sh_exec ()
#8  0x0000000000445bee in sh_eval ()
#9  0x0000000000415cd8 in sh_trap ()
#10 0x000000000041616d in sh_done ()
#11 0x0000000000407606 in sh_main ()
#12 0x00000000004069d6 in main ()

Are you aware of any bug fix that this may related to or fix in a future 
release?

Thank you for your help!

Michael Nemeth
Global Engineering Systems
[cid:[email protected]]
*[email protected]

<<inline: image001.png>>

_______________________________________________
ast-users mailing list
[email protected]
https://mailman.research.att.com/mailman/listinfo/ast-users

Reply via email to